US20190122196A1 - Systems and methods of operating a point of sale system - Google Patents
Systems and methods of operating a point of sale system Download PDFInfo
- Publication number
- US20190122196A1 US20190122196A1 US15/792,406 US201715792406A US2019122196A1 US 20190122196 A1 US20190122196 A1 US 20190122196A1 US 201715792406 A US201715792406 A US 201715792406A US 2019122196 A1 US2019122196 A1 US 2019122196A1
- Authority
- US
- United States
- Prior art keywords
- cashier
- rfid
- rfid reader
- rfid tag
- reader
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/203—Inventory monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/208—Input by product or record sensing, e.g. weighing or scanner processing
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07G—REGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
- G07G1/00—Cash registers
- G07G1/0036—Checkout procedures
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07G—REGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
- G07G1/00—Cash registers
- G07G1/0036—Checkout procedures
- G07G1/0045—Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader
- G07G1/009—Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader the reader being an RFID reader
Definitions
- RFID radio frequency identification
- RFID tags One example of relying on RFID tags to maintain proper inventory count arises in the context of checkout transactions. As consumers pick various items from store shelves and proceed through a checkout area to pay for those items, stores sometimes use RFID readers to keep track of products bought and ultimately removed from the store. This is done to maintain a more accurate inventory, which can help with maintaining an appropriate product stock.
- RFID systems are susceptible to false reads. For instance, a consumer with a shopping basket having various items therein may inadvertently wander near a checkout lane. The basket's proximity to the checkout lane may be close enough for the RFID reader to read the RFID tags on the products in the basket, causing a false subtraction of the products associated with the tags from the store's inventory. As a result, inventory count can be adversely effected, and thus there is a need for improved systems and methods of operating point of sale checkout systems.
- FIG. 1 illustrates an exemplary view of a venue housing a point of sale (POS) system in accordance with an embodiment of the present invention.
- POS point of sale
- FIG. 2 illustrates a block diagram of an exemplary network linking at least some components of the POS system of FIG. 1 .
- FIG. 3 illustrates a top view of an exemplary POS transaction station.
- FIG. 4 illustrates a flowchart representative of an exemplary method of operating a POS system.
- FIG. 5 illustrates a flowchart representative of an exemplary method of operating a POS system.
- the present invention is a point of sale (POS) system that includes: a transaction station configured to be operated by a cashier; a cashier detector configured to detect a presence of the cashier at the transaction station; a first radio frequency identification (RFID) reader; and a controller operably connected to the cashier detector and to the first RFID reader, the controller being configured to operate the first RFID reader in a first mode when the cashier is detected, the controller being further configured to operate the first RFID reader in a second mode when the cashier is not detected.
- RFID radio frequency identification
- the present invention is a method of operating a POS system having an RFID reader.
- the method includes: providing a transaction station configured to be operated by a cashier; detecting a presence of the cashier at the transaction station; instructing the RFID reader to operate in a first mode when the cashier is detected; and instructing the RFID reader to operate in a second mode when the cashier is not detected.
- the present invention is a method of operating a POS system having an RFID reader, the POS system being in contact with a product database.
- the method includes: providing a transaction station configured to be operated by a cashier; detecting a presence of the cashier at the transaction station; reading, via the RFID reader, an RFID tag associated with a product; causing the reading of the RFID tag to be reflected in the product database when the cashier is detected; and causing the reading of the RFID tag to not be reflected in the product database when the cashier is not detected.
- FIG. 1 illustrates a perspective view of an exemplary retail venue 100 for implementing POS systems in accordance with the present disclosure.
- the venue 100 includes a sales floor 102 and a back room 104 .
- the sales floor 102 is typically accessible to the general public and is stocked with various products (also referred to as items or retail items) 106 positioned in an accessible manner to be picked and bought by the customers (also referred to as consumers).
- each product 106 includes an RFID tag 107 that is associated with the respective product and is attached thereto in some manner (e.g., sticker, tag, etc.)
- RFID tag 107 that is associated with the respective product and is attached thereto in some manner (e.g., sticker, tag, etc.)
- customers pass through one of the POS transaction station 108 where, with the assistance of a cashier 110 , they finalize their purchase of the picked products 106 .
- each POS transaction station 108 includes a computer system 112 .
- Each computer systems 112 has one or more processors, and is in electronic communication with a centralized server 114 via a network switch 116 and/or via other wired, wireless, direct, or networked communication means.
- the server 114 includes at least one or more processor and/or controllers 118 , and a memory having a database 120 stored therein which includes information related to items 106 . While in the illustrated embodiment of FIG. 1 the server 114 is shown as being on the venue 100 premises, in other embodiments it can be partially or fully located off-site. Also, it will be appreciated that server 114 does not have to be embodied in a single enclosure, and may instead comprise a series of enclosures/computer systems configured to work together to provide enterprise-level capabilities.
- the transaction station 108 also includes an RFID reader 122 and an interface accessory 124 , which in some embodiments can include an optical reader configured to capture and decode a barcode, touchpad, keypad, display, and/or other data input/output accessory.
- the RFID reader 122 includes an RFID tag reader module that has a controller, a memory, and an RF transceiver, which are operatively connected to one or more RFID antenna elements, which are energized by the RFID module to radiate RF energy (also referred to as a beam) over an antenna beam pattern.
- the RFID reader 122 is operated to transmit the RF beam or wave energy to the tags, and to receive RF response signals from the tags, thereby interrogating and processing the payloads of the tags that are in a read-zone of the RF transceiver.
- the RFID read-zone for each RFID reader 122 may be an omnidirectional 360° zone or directional zone defined by an angle smaller than 360°. Additionally, its read-zone does not have to extend uniformly in every direction, and instead each direction may have an individually adjusted range. It should be appreciated that the 122 may be placed anywhere within the venue 100 so long as its read-zone can be adjusted to cover the appropriate area near the transaction station 108 . Examples of these placements include adjacent to or near the ceiling, just above/in-line/below the transaction station 108 counter, inside the interface accessory 124 , etc.
- the RF transceiver may capture payload data or target data that identifies the tags and their associated products (e.g., retail items 106 ), and its operation can be controlled (partially or fully) by any one or more of the centralized server 114 , computer system 112 , or an RFID tag reader module that's part of the RFID reader.
- a consumer To purchase the picked items 106 , a consumer typically places the items 106 on the counter 126 for easy access by the cashier 110 .
- the cashier 110 then proceeds to scan an identifying target that is associated with each item 106 via the interface accessory 124 and process a payment from the consumer after scanning all items.
- the identifying target is a barcode such as, for example, a universal product code (UPC) barcode.
- UPC universal product code
- the RFID reader 122 is used in conjunction with the purchase process outlined above. As shown in FIG. 3 , which illustrates a top view of the transaction station 108 , an RFID reader 122 is positioned within the vicinity of the station such that its read-zone (in this case defined by the dashed circular line 128 ) extends at least partially over the transaction station 108 , and more specifically, the area where the cashier is likely to handle the purchased items 106 .
- the RFID reader 122 is configured to read RFID tags within its read-zone 128 and report those tags to the centralized server 114 so that a purchase of the items 106 associated with the read tags 107 can be reflected in the inventory database 120 .
- the operation of the RFID reader 122 is configured to coincide with a presence of the cashier 110 .
- the reading operation of the RFID reader 122 is modified in some way based on the detection of a presence of the cashier 110 .
- the presence of a cashier may be detected in any number of way.
- the transaction station 108 can be provided with a pressure mat 130 that is placed in an area where the cashier 110 is expected to stand during a checkout transaction.
- Another mechanism for determining a presence of a cashier 110 can employ a video camera 132 having its field of view 133 directed at least partially into the area that is expected to be occupied by the cashier using a checkout transaction.
- a video feed from the camera 132 can be fed to the centralized server where it can be analyzed for a presence of a person in the designated cashier area. If the server 114 determines that a person is present in the specific area, a deduction can be made that it is the cashier 110 .
- Yet another mechanism for determining a presence of a cashier 110 includes the primary RFID reader 122 or a secondary RFID reader 134 to detect an RFID tag that is associated with an employee who is a cashier. When such a tag is detected within the read-zone of the respective RFID reader, the reading characteristics of the primary RFID reader 122 can be adjusted accordingly. In this case, it may be advantageous to use a secondary RFID reader 134 as it may have a smaller and/or a more directional read-zone 136 that particularly covers the area where the cashier 110 is expected to be during the transaction. Additionally, having two separate RFID readers can allow one to be ran at a constant setting while varying the operational characteristics of the other reader.
- the primary RFID reader 122 can be deactivated unless a cashier-associated RFID tag is detected by the secondary RFID reader 134 .
- the primary RFID reader 122 can simplify the point of sale system, potentially leading so a less expensive, more reliable configuration.
- the operation of the RFID reader itself can be varied depending on whether or not a cashier-associated RFID tag is detected.
- the read-zone of the RFID reader 122 may be set to extend over a limited area 138 until the cashier-associated RFID tag is detected, at which point the RFID reader's 122 read-zone is adjusted to extend over the area 128 .
- Other examples can include operating the RFID reader 122 at a relatively low duty cycle, essentially periodically pulsing the reader until a cashier-associated RFID tag is detected thereby. Once the detection occurs, the RFID reader 122 can be switched to operate at a higher (e.g., full) duty cycle.
- the detection of the presence or absence of the cashier 110 is used in selecting an appropriate operation setting for the RFID reader 122 and/or how the information that is read by the RFID reader 122 is processed by, for example, the server 144 .
- This variation of the operational characteristics may help improve inventory accuracy by reducing the number of read RFID tags that are erroneously associated with a purchased item.
- the RFID reader 122 remains inactive (i.e., avoids emitting a signal that would interrogate an RFID tag within its read-zone) when a cashier is not detected. This is changed when a cashier is detected in the designated location, with the RFID reader becoming active (i.e., operating in a manner sufficient to read RFID tags within its typical read-zone).
- the RFID reader 122 is operated in a low (e.g., any range that falls below 10%) duty cycle mode.
- the directionality and/or the range of the read-zone of the RFID reader 122 can be altered as described earlier with reference to read-zone 138 when the cashier is not detected. In all these configuration RFID tags that appears within the vicinity of the RFID reader 122 , and more particularly within its read-zone 128 , will either not be read of will have a lower chance of being read when a cashier is not at the POS transaction station 108 .
- Another approach to reducing undesired RFID tag reads is to combine the detection of the presence or absence of a cashier with the manipulation of the data transmitted from the RFID reader 122 to the server 114 .
- network traffic from the RFID reader 122 may be blocked and/or ignored at times when the cashier is not detected. This blocking can occur at any level between and including the RFID reader 122 and the server 114 , and can be achieved via any appropriate combination of hardware and software.
- server 114 may to configured to ignore read signals from the RFID reader 122 when the cashier is not detected such that a reading of an RFID tag by the reader 122 is not reflected as a POS transaction in the product database 120 .
- the computer system 112 can be configured to transmit an RFID read to the server 122 when the cashier is detected and it can further be configured to restrict the transmission when the cashier's absence is detected.
- step 200 there is provided a transaction station configured to be operated by a cashier.
- step 202 a determination is made, by way of detecting, whether or not a cashier is present at the transaction station.
- step 204 the RFID reader is instructed to operate in a first mode (e.g., typical operating configuration that allows for RFID tags to be read such that these reads can be reflected in the product database), and if the cashier is not detected (i.e., the cashier is found to be absent), in step 206 the RFID reader is instructed to operate in a second mode (e.g., limited range, lower duty cycle, inactive, etc.).
- a first mode e.g., typical operating configuration that allows for RFID tags to be read such that these reads can be reflected in the product database
- a second mode e.g., limited range, lower duty cycle, inactive, etc.
- FIG. 5 illustrates another flowchart representative of another exemplary method of operating a POS system having an RFID reader, where the POS system is in contact with a product database.
- a transaction station configured to be operated by a cashier.
- a determination is made, by way of detecting, whether or not a cashier is present at the transaction station. If a cashier is detected, upon reading an RFID tag in step 304 , the reading of that RFID tag is caused to be reflected in the product database in step 306 . Otherwise, if a cashier is not detected (i.e., the cashier is found to be absent), upon reading an RFID tag in step 308 , the reading of that RFID tag is caused to be ignored in the product database in step 306 .
- a includes . . . a”, “contains . . . a” does not, without more constraints, preclude the existence of additional identical elements in the process, method, article, or apparatus that comprises, has, includes, contains the element.
- the terms “a” and “an” are defined as one or more unless explicitly stated otherwise herein.
- the terms “substantially”, “essentially”, “approximately”, “about” or any other version thereof, are defined as being close to as understood by one of ordinary skill in the art, and in one non-limiting embodiment the term is defined to be within 10%, in another embodiment within 5%, in another embodiment within 1% and in another embodiment within 0.5%.
- the term “coupled” as used herein is defined as connected, although not necessarily directly and not necessarily mechanically.
- a device or structure that is “configured” in a certain way is configured in at least that way, but may also be configured in ways that are not listed.
- processors such as microprocessors, digital signal processors, customized processors and field programmable gate arrays (FPGAs) and unique stored program instructions (including both software and firmware) that control the one or more processors to implement, in conjunction with certain non-processor circuits, some, most, or all of the functions of the method and/or apparatus described herein.
- processors or “processing devices” such as microprocessors, digital signal processors, customized processors and field programmable gate arrays (FPGAs) and unique stored program instructions (including both software and firmware) that control the one or more processors to implement, in conjunction with certain non-processor circuits, some, most, or all of the functions of the method and/or apparatus described herein.
- FPGAs field programmable gate arrays
- unique stored program instructions including both software and firmware
- an embodiment can be implemented as a computer-readable storage medium having computer readable code stored thereon for programming a computer (e.g., comprising a processor) to perform a method as described and claimed herein.
- Examples of such computer-readable storage mediums include, but are not limited to, a hard disk, a CD-ROM, an optical storage device, a magnetic storage device, a ROM (Read Only Memory), a PROM (Programmable Read Only Memory), an EPROM (Erasable Programmable Read Only Memory), an EEPROM (Electrically Erasable Programmable Read Only Memory) and a Flash memory.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Cash Registers Or Receiving Machines (AREA)
Abstract
Description
- Modern retail venues often employ radio frequency identification (RFID) technologies in an effort to, among other thing, maintain an accurate accounting of their stock, assist with on-demand product replenishment, and reduce shrink events. This is typically done by affixing RFID tags to products and making an association there between that is recorded within a venue database. By tracking the RFID tags, venues are able to track products and take appropriate actions depending on where and when the RFID tags are read.
- One example of relying on RFID tags to maintain proper inventory count arises in the context of checkout transactions. As consumers pick various items from store shelves and proceed through a checkout area to pay for those items, stores sometimes use RFID readers to keep track of products bought and ultimately removed from the store. This is done to maintain a more accurate inventory, which can help with maintaining an appropriate product stock. However, such systems are susceptible to false reads. For instance, a consumer with a shopping basket having various items therein may inadvertently wander near a checkout lane. The basket's proximity to the checkout lane may be close enough for the RFID reader to read the RFID tags on the products in the basket, causing a false subtraction of the products associated with the tags from the store's inventory. As a result, inventory count can be adversely effected, and thus there is a need for improved systems and methods of operating point of sale checkout systems.
- The accompanying figures, where like reference numerals refer to identical or functionally similar elements throughout the separate views, together with the detailed description below, are incorporated in and form part of the specification, and serve to further illustrate embodiments of concepts that include the claimed invention, and explain various principles and advantages of those embodiments.
-
FIG. 1 illustrates an exemplary view of a venue housing a point of sale (POS) system in accordance with an embodiment of the present invention. -
FIG. 2 illustrates a block diagram of an exemplary network linking at least some components of the POS system ofFIG. 1 . -
FIG. 3 illustrates a top view of an exemplary POS transaction station. -
FIG. 4 illustrates a flowchart representative of an exemplary method of operating a POS system. -
FIG. 5 illustrates a flowchart representative of an exemplary method of operating a POS system. - Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of embodiments of the present invention.
- The apparatus and method components have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein.
- In an embodiment, the present invention is a point of sale (POS) system that includes: a transaction station configured to be operated by a cashier; a cashier detector configured to detect a presence of the cashier at the transaction station; a first radio frequency identification (RFID) reader; and a controller operably connected to the cashier detector and to the first RFID reader, the controller being configured to operate the first RFID reader in a first mode when the cashier is detected, the controller being further configured to operate the first RFID reader in a second mode when the cashier is not detected.
- In another embodiment, the present invention is a method of operating a POS system having an RFID reader. The method includes: providing a transaction station configured to be operated by a cashier; detecting a presence of the cashier at the transaction station; instructing the RFID reader to operate in a first mode when the cashier is detected; and instructing the RFID reader to operate in a second mode when the cashier is not detected.
- In still another embodiment, the present invention is a method of operating a POS system having an RFID reader, the POS system being in contact with a product database. The method includes: providing a transaction station configured to be operated by a cashier; detecting a presence of the cashier at the transaction station; reading, via the RFID reader, an RFID tag associated with a product; causing the reading of the RFID tag to be reflected in the product database when the cashier is detected; and causing the reading of the RFID tag to not be reflected in the product database when the cashier is not detected.
- Referring now to the drawings,
FIG. 1 illustrates a perspective view of anexemplary retail venue 100 for implementing POS systems in accordance with the present disclosure. Thevenue 100 includes asales floor 102 and aback room 104. Thesales floor 102 is typically accessible to the general public and is stocked with various products (also referred to as items or retail items) 106 positioned in an accessible manner to be picked and bought by the customers (also referred to as consumers). Preferably, eachproduct 106 includes anRFID tag 107 that is associated with the respective product and is attached thereto in some manner (e.g., sticker, tag, etc.) Upon picking any number ofproducts 106 of choice, customers pass through one of thePOS transaction station 108 where, with the assistance of acashier 110, they finalize their purchase of the pickedproducts 106. - As better seen in
FIG. 2 , eachPOS transaction station 108 includes acomputer system 112. Eachcomputer systems 112 has one or more processors, and is in electronic communication with a centralizedserver 114 via anetwork switch 116 and/or via other wired, wireless, direct, or networked communication means. To maintain proper inventory, theserver 114 includes at least one or more processor and/orcontrollers 118, and a memory having adatabase 120 stored therein which includes information related toitems 106. While in the illustrated embodiment ofFIG. 1 theserver 114 is shown as being on thevenue 100 premises, in other embodiments it can be partially or fully located off-site. Also, it will be appreciated thatserver 114 does not have to be embodied in a single enclosure, and may instead comprise a series of enclosures/computer systems configured to work together to provide enterprise-level capabilities. - The
transaction station 108 also includes anRFID reader 122 and aninterface accessory 124, which in some embodiments can include an optical reader configured to capture and decode a barcode, touchpad, keypad, display, and/or other data input/output accessory. TheRFID reader 122 includes an RFID tag reader module that has a controller, a memory, and an RF transceiver, which are operatively connected to one or more RFID antenna elements, which are energized by the RFID module to radiate RF energy (also referred to as a beam) over an antenna beam pattern. TheRFID reader 122 is operated to transmit the RF beam or wave energy to the tags, and to receive RF response signals from the tags, thereby interrogating and processing the payloads of the tags that are in a read-zone of the RF transceiver. The RFID read-zone for eachRFID reader 122 may be an omnidirectional 360° zone or directional zone defined by an angle smaller than 360°. Additionally, its read-zone does not have to extend uniformly in every direction, and instead each direction may have an individually adjusted range. It should be appreciated that the 122 may be placed anywhere within thevenue 100 so long as its read-zone can be adjusted to cover the appropriate area near thetransaction station 108. Examples of these placements include adjacent to or near the ceiling, just above/in-line/below thetransaction station 108 counter, inside theinterface accessory 124, etc. - During operation, the RF transceiver may capture payload data or target data that identifies the tags and their associated products (e.g., retail items 106), and its operation can be controlled (partially or fully) by any one or more of the centralized
server 114,computer system 112, or an RFID tag reader module that's part of the RFID reader. - To purchase the picked
items 106, a consumer typically places theitems 106 on thecounter 126 for easy access by thecashier 110. Thecashier 110 then proceeds to scan an identifying target that is associated with eachitem 106 via theinterface accessory 124 and process a payment from the consumer after scanning all items. In some embodiments, the identifying target is a barcode such as, for example, a universal product code (UPC) barcode. - To help ensure a proper accounting of the product inventory within the
venue 100, theRFID reader 122 is used in conjunction with the purchase process outlined above. As shown inFIG. 3 , which illustrates a top view of thetransaction station 108, anRFID reader 122 is positioned within the vicinity of the station such that its read-zone (in this case defined by the dashed circular line 128) extends at least partially over thetransaction station 108, and more specifically, the area where the cashier is likely to handle the purchaseditems 106. TheRFID reader 122 is configured to read RFID tags within its read-zone 128 and report those tags to the centralizedserver 114 so that a purchase of theitems 106 associated with theread tags 107 can be reflected in theinventory database 120. - To help avoid reading RFID tags of
items 106 that are not being purchased but happened to enter the read-zone 128, the operation of theRFID reader 122 is configured to coincide with a presence of thecashier 110. As such, the reading operation of theRFID reader 122 is modified in some way based on the detection of a presence of thecashier 110. - The presence of a cashier may be detected in any number of way. For example, the
transaction station 108 can be provided with apressure mat 130 that is placed in an area where thecashier 110 is expected to stand during a checkout transaction. Monitoring, via, for example, the centralizedserver 114, the pressure levels exerted on the mat, a determination of a person standing thereon can be made when the pressure indication exceeds a certain threshold. - Another mechanism for determining a presence of a
cashier 110 can employ avideo camera 132 having its field ofview 133 directed at least partially into the area that is expected to be occupied by the cashier using a checkout transaction. A video feed from thecamera 132 can be fed to the centralized server where it can be analyzed for a presence of a person in the designated cashier area. If theserver 114 determines that a person is present in the specific area, a deduction can be made that it is thecashier 110. - Yet another mechanism for determining a presence of a
cashier 110 includes theprimary RFID reader 122 or asecondary RFID reader 134 to detect an RFID tag that is associated with an employee who is a cashier. When such a tag is detected within the read-zone of the respective RFID reader, the reading characteristics of theprimary RFID reader 122 can be adjusted accordingly. In this case, it may be advantageous to use asecondary RFID reader 134 as it may have a smaller and/or a more directional read-zone 136 that particularly covers the area where thecashier 110 is expected to be during the transaction. Additionally, having two separate RFID readers can allow one to be ran at a constant setting while varying the operational characteristics of the other reader. For example, while thesecondary RFID reader 134 can be operated at a full duty cycle at all times, theprimary RFID reader 122 can be deactivated unless a cashier-associated RFID tag is detected by thesecondary RFID reader 134. On the other hand, relying on just theprimary RFID reader 122 can simplify the point of sale system, potentially leading so a less expensive, more reliable configuration. In case of using theRFID reader 122 to detect a cashier, the operation of the RFID reader itself can be varied depending on whether or not a cashier-associated RFID tag is detected. For example, the read-zone of theRFID reader 122 may be set to extend over alimited area 138 until the cashier-associated RFID tag is detected, at which point the RFID reader's 122 read-zone is adjusted to extend over thearea 128. Other examples can include operating theRFID reader 122 at a relatively low duty cycle, essentially periodically pulsing the reader until a cashier-associated RFID tag is detected thereby. Once the detection occurs, theRFID reader 122 can be switched to operate at a higher (e.g., full) duty cycle. - The detection of the presence or absence of the
cashier 110 is used in selecting an appropriate operation setting for theRFID reader 122 and/or how the information that is read by theRFID reader 122 is processed by, for example, the server 144. This variation of the operational characteristics may help improve inventory accuracy by reducing the number of read RFID tags that are erroneously associated with a purchased item. - In some embodiments, the
RFID reader 122 remains inactive (i.e., avoids emitting a signal that would interrogate an RFID tag within its read-zone) when a cashier is not detected. This is changed when a cashier is detected in the designated location, with the RFID reader becoming active (i.e., operating in a manner sufficient to read RFID tags within its typical read-zone). In other embodiments, rather than being inactive during the times when a cashier is not detected, theRFID reader 122 is operated in a low (e.g., any range that falls below 10%) duty cycle mode. In still other embodiments, the directionality and/or the range of the read-zone of theRFID reader 122 can be altered as described earlier with reference to read-zone 138 when the cashier is not detected. In all these configuration RFID tags that appears within the vicinity of theRFID reader 122, and more particularly within its read-zone 128, will either not be read of will have a lower chance of being read when a cashier is not at thePOS transaction station 108. - Another approach to reducing undesired RFID tag reads is to combine the detection of the presence or absence of a cashier with the manipulation of the data transmitted from the
RFID reader 122 to theserver 114. In some embodiments, network traffic from theRFID reader 122 may be blocked and/or ignored at times when the cashier is not detected. This blocking can occur at any level between and including theRFID reader 122 and theserver 114, and can be achieved via any appropriate combination of hardware and software. For example,server 114 may to configured to ignore read signals from theRFID reader 122 when the cashier is not detected such that a reading of an RFID tag by thereader 122 is not reflected as a POS transaction in theproduct database 120. This can be changed when a cashier is detected, allowing the reads by theRFID reader 122 to be reflected as a POS transaction in theproduct database 120. In other examples, if theRFID reader 122 is operatively connected to theserver 114 through thecomputer system 112, thecomputer system 112 can be configured to transmit an RFID read to theserver 122 when the cashier is detected and it can further be configured to restrict the transmission when the cashier's absence is detected. - Referring now to
FIG. 4 , shown therein is a flowchart representative of an exemplary method of operating a POS system having an RFID reader. Instep 200, there is provided a transaction station configured to be operated by a cashier. Instep 202, a determination is made, by way of detecting, whether or not a cashier is present at the transaction station. If a cashier is detected, instep 204 the RFID reader is instructed to operate in a first mode (e.g., typical operating configuration that allows for RFID tags to be read such that these reads can be reflected in the product database), and if the cashier is not detected (i.e., the cashier is found to be absent), instep 206 the RFID reader is instructed to operate in a second mode (e.g., limited range, lower duty cycle, inactive, etc.). -
FIG. 5 illustrates another flowchart representative of another exemplary method of operating a POS system having an RFID reader, where the POS system is in contact with a product database. Instep 300, there is provided a transaction station configured to be operated by a cashier. Instep 302, a determination is made, by way of detecting, whether or not a cashier is present at the transaction station. If a cashier is detected, upon reading an RFID tag instep 304, the reading of that RFID tag is caused to be reflected in the product database instep 306. Otherwise, if a cashier is not detected (i.e., the cashier is found to be absent), upon reading an RFID tag instep 308, the reading of that RFID tag is caused to be ignored in the product database instep 306. - In the foregoing specification, specific embodiments have been described. However, one of ordinary skill in the art appreciates that various modifications and changes can be made without departing from the scope of the invention as set forth in the claims below. Accordingly, the specification and figures are to be regarded in an illustrative rather than a restrictive sense, and all such modifications are intended to be included within the scope of present teachings. Additionally, the described embodiments/examples/implementations should not be interpreted as mutually exclusive, and should instead be understood as potentially combinable if such combinations are permissive in any way. In other words, any feature disclosed in any of the aforementioned embodiments/examples/implementations may be included in any of the other aforementioned embodiments/examples/implementations.
- The benefits, advantages, solutions to problems, and any element(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential features or elements of any or all the claims. The invention is defined solely by the appended claims including any amendments made during the pendency of this application and all equivalents of those claims as issued.
- Moreover, in this document, relational terms such as first and second, top and bottom, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms “comprises,” “comprising,” “has”, “having,” “includes”, “including,” “contains”, “containing” or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises, has, includes, contains a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. An element proceeded by “comprises . . . a”, “has . . . a”, “includes . . . a”, “contains . . . a” does not, without more constraints, preclude the existence of additional identical elements in the process, method, article, or apparatus that comprises, has, includes, contains the element. The terms “a” and “an” are defined as one or more unless explicitly stated otherwise herein. The terms “substantially”, “essentially”, “approximately”, “about” or any other version thereof, are defined as being close to as understood by one of ordinary skill in the art, and in one non-limiting embodiment the term is defined to be within 10%, in another embodiment within 5%, in another embodiment within 1% and in another embodiment within 0.5%. The term “coupled” as used herein is defined as connected, although not necessarily directly and not necessarily mechanically. A device or structure that is “configured” in a certain way is configured in at least that way, but may also be configured in ways that are not listed.
- It will be appreciated that some embodiments may be comprised of one or more generic or specialized processors (or “processing devices”) such as microprocessors, digital signal processors, customized processors and field programmable gate arrays (FPGAs) and unique stored program instructions (including both software and firmware) that control the one or more processors to implement, in conjunction with certain non-processor circuits, some, most, or all of the functions of the method and/or apparatus described herein. Alternatively, some or all functions could be implemented by a state machine that has no stored program instructions, or in one or more application specific integrated circuits (ASICs), in which each function or some combinations of certain of the functions are implemented as custom logic. Of course, a combination of the two approaches could be used.
- Moreover, an embodiment can be implemented as a computer-readable storage medium having computer readable code stored thereon for programming a computer (e.g., comprising a processor) to perform a method as described and claimed herein. Examples of such computer-readable storage mediums include, but are not limited to, a hard disk, a CD-ROM, an optical storage device, a magnetic storage device, a ROM (Read Only Memory), a PROM (Programmable Read Only Memory), an EPROM (Erasable Programmable Read Only Memory), an EEPROM (Electrically Erasable Programmable Read Only Memory) and a Flash memory. Further, it is expected that one of ordinary skill, notwithstanding possibly significant effort and many design choices motivated by, for example, available time, current technology, and economic considerations, when guided by the concepts and principles disclosed herein will be readily capable of generating such software instructions and programs and ICs with minimal experimentation.
- The Abstract of the Disclosure is provided to allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in various embodiments for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separately claimed subject matter.
Claims (21)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/792,406 US20190122196A1 (en) | 2017-10-24 | 2017-10-24 | Systems and methods of operating a point of sale system |
US18/109,222 US20230196325A1 (en) | 2017-10-24 | 2023-02-13 | Systems and Methods of Operating a Point of Sale System |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/792,406 US20190122196A1 (en) | 2017-10-24 | 2017-10-24 | Systems and methods of operating a point of sale system |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/109,222 Division US20230196325A1 (en) | 2017-10-24 | 2023-02-13 | Systems and Methods of Operating a Point of Sale System |
Publications (1)
Publication Number | Publication Date |
---|---|
US20190122196A1 true US20190122196A1 (en) | 2019-04-25 |
Family
ID=66170625
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/792,406 Abandoned US20190122196A1 (en) | 2017-10-24 | 2017-10-24 | Systems and methods of operating a point of sale system |
US18/109,222 Pending US20230196325A1 (en) | 2017-10-24 | 2023-02-13 | Systems and Methods of Operating a Point of Sale System |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/109,222 Pending US20230196325A1 (en) | 2017-10-24 | 2023-02-13 | Systems and Methods of Operating a Point of Sale System |
Country Status (1)
Country | Link |
---|---|
US (2) | US20190122196A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180033226A1 (en) * | 2009-02-10 | 2018-02-01 | Yikes Llc | Radio frequency antenna and system for presence sensing and monitoring |
US11580317B2 (en) * | 2019-03-16 | 2023-02-14 | Nec Corporation | Tracking RFID groups with spatio-temporal proximity |
US20230316254A1 (en) * | 2022-03-29 | 2023-10-05 | Shopify Inc. | Method and system for customer responsive point of sale device |
US11843988B2 (en) | 2018-03-19 | 2023-12-12 | Simpello Llc | System and method for detecting presence within a strictly defined wireless zone |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2087473A (en) * | 1977-08-25 | 1982-05-26 | Hastings Otis | Secured Transaction Processing System |
US6150948A (en) * | 1999-04-24 | 2000-11-21 | Soundcraft, Inc. | Low-power radio frequency identification reader |
USRE37166E1 (en) * | 1989-08-11 | 2001-05-08 | Spectra-Physics Scanning Systems, Inc. | Scanner with coupon validation |
US20060211412A1 (en) * | 2005-03-21 | 2006-09-21 | Vance Scott L | Methods, devices, and computer program products for providing multiple operational modes in a mobile terminal |
US20070069030A1 (en) * | 2005-09-28 | 2007-03-29 | Sauerwein James T Jr | Data collection device and network having radio signal responsive mode switching |
US20170251183A1 (en) * | 2016-02-29 | 2017-08-31 | Ncr Corporation | Identification and imaging of terminal-proximate event occurences |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7667575B2 (en) * | 2004-07-30 | 2010-02-23 | Reva Systems Corporation | Location virtualization in an RFID system |
US8463540B2 (en) * | 2005-03-18 | 2013-06-11 | Gatekeeper Systems, Inc. | Two-way communication system for tracking locations and statuses of wheeled vehicles |
JP4659566B2 (en) * | 2005-09-06 | 2011-03-30 | 東芝テック株式会社 | RFID tag reader control device and RFID tag reader control program |
US8028920B2 (en) * | 2008-06-30 | 2011-10-04 | Symbol Technologies, Inc. | Data capture terminal with multiple readers operable in handheld and hands-free modes of operation |
US20150379317A1 (en) * | 2014-06-25 | 2015-12-31 | Amazon Technologies, Inc. | Tracking Transactions By Confluences of RFID Signals |
US20190114449A1 (en) * | 2017-10-18 | 2019-04-18 | Symbol Technologies, Llc | Systems and methods for maintaining rfid tags in a predetermined state |
-
2017
- 2017-10-24 US US15/792,406 patent/US20190122196A1/en not_active Abandoned
-
2023
- 2023-02-13 US US18/109,222 patent/US20230196325A1/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2087473A (en) * | 1977-08-25 | 1982-05-26 | Hastings Otis | Secured Transaction Processing System |
USRE37166E1 (en) * | 1989-08-11 | 2001-05-08 | Spectra-Physics Scanning Systems, Inc. | Scanner with coupon validation |
US6150948A (en) * | 1999-04-24 | 2000-11-21 | Soundcraft, Inc. | Low-power radio frequency identification reader |
US20060211412A1 (en) * | 2005-03-21 | 2006-09-21 | Vance Scott L | Methods, devices, and computer program products for providing multiple operational modes in a mobile terminal |
US20070069030A1 (en) * | 2005-09-28 | 2007-03-29 | Sauerwein James T Jr | Data collection device and network having radio signal responsive mode switching |
US20170251183A1 (en) * | 2016-02-29 | 2017-08-31 | Ncr Corporation | Identification and imaging of terminal-proximate event occurences |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180033226A1 (en) * | 2009-02-10 | 2018-02-01 | Yikes Llc | Radio frequency antenna and system for presence sensing and monitoring |
US10818119B2 (en) * | 2009-02-10 | 2020-10-27 | Yikes Llc | Radio frequency antenna and system for presence sensing and monitoring |
US11704955B2 (en) | 2009-02-10 | 2023-07-18 | Simpello Llc | Radio frequency antenna and system for presence sensing and monitoring |
US11843988B2 (en) | 2018-03-19 | 2023-12-12 | Simpello Llc | System and method for detecting presence within a strictly defined wireless zone |
US11580317B2 (en) * | 2019-03-16 | 2023-02-14 | Nec Corporation | Tracking RFID groups with spatio-temporal proximity |
US20230316254A1 (en) * | 2022-03-29 | 2023-10-05 | Shopify Inc. | Method and system for customer responsive point of sale device |
US11983689B2 (en) * | 2022-03-29 | 2024-05-14 | Shopify Inc. | Method and system for customer responsive point of sale device |
Also Published As
Publication number | Publication date |
---|---|
US20230196325A1 (en) | 2023-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230196325A1 (en) | Systems and Methods of Operating a Point of Sale System | |
US10332117B2 (en) | System and method for mobile device self-checkout for retail transactions with loss protection | |
US9171442B2 (en) | Item identification using video recognition to supplement bar code or RFID information | |
US10140486B1 (en) | Systems and methods for point-of-sale detection with image sensors for identifying new radio frequency identification (RFID) tag events within a vicinity of an RFID reader | |
US9311799B2 (en) | Modifying RFID system operation using movement detection | |
US7501950B2 (en) | RFID tag recognition apparatus and method and article sales data processing apparatus | |
US20110320322A1 (en) | Inventory monitoring using complementary modes for item identification | |
US10140829B1 (en) | RFID functions for point of sale lanes | |
US11829981B2 (en) | Systems and methods for data capture device selection from within data capture device repository | |
US20230359841A1 (en) | Store system, store apparatus, checkout method, and program | |
US10504015B2 (en) | Item security system and method of verifying items selected for purchase at a checkout station | |
US20100171617A1 (en) | Wireless tag reading method and apparatus | |
US10997381B2 (en) | Systems and methods for using radio frequency identification as an adaptive alarm threshold | |
WO2019168943A1 (en) | Systems and methods for security tag detachment or deactivation | |
US20230120798A1 (en) | Systems and methods for detecting a mis-scan of an item for purchase | |
US20230222518A1 (en) | Systems and methods for detecting potential shrink events via rfid technology | |
US10490044B2 (en) | Anti-fraud security tag removal | |
US10157303B1 (en) | Systems and methods for steering one or more product readers and determining product attributes | |
US11887373B2 (en) | Sales management system and sales management method | |
US9971919B1 (en) | Systems and method to adaptively optimize RFID-based point-of-sale performance | |
US10062068B1 (en) | Checkout workstation | |
JP2022125082A (en) | Registration system and checkout method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SYMBOL TECHNOLOGIES, LLC, NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LAURIA, CHARLES G.;LAVERY, RICHARD J.;CALVARESE, RUSSELL;REEL/FRAME:043962/0454 Effective date: 20171024 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCV | Information on status: appeal procedure |
Free format text: APPEAL BRIEF (OR SUPPLEMENTAL BRIEF) ENTERED AND FORWARDED TO EXAMINER |
|
STCV | Information on status: appeal procedure |
Free format text: EXAMINER'S ANSWER TO APPEAL BRIEF MAILED |
|
STCV | Information on status: appeal procedure |
Free format text: ON APPEAL -- AWAITING DECISION BY THE BOARD OF APPEALS |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |